The number and complexity of phishing attacks are constantly increasing, with both individuals and corporations being targeted to extract sensitive data and money. Those most vulnerable, such as seniors, are often the primary targets, as well as those who are preoccupied, busy, or have limited knowledge of cybersecurity.
Phishing emails are meticulously crafted to target specific individuals, using information from social media profiles and other online sources to entice victims with personal details such as family or job history. To combat these attacks, cybersecurity awareness is crucial. Employees who are familiar with common warning signs and remain vigilant can act as the first line of defense for businesses’ cybersecurity efforts.
Here are some indications that an email or message could potentially be a scam, and what to watch out for:
1. Unfamiliar Greetings
Avoid emails with unfamiliar greetings that seem off in tone or spelling your name wrong, using a first and last name, or calling you by a full name when you usually go by a nickname.
2. Grammar and Spelling Mistakes
Be cautious of grammar and spelling errors in messages from professional sources, and double check the sender’s email address carefully for any discrepancies or misspellings.
3. Inconsistent Email Address & Links
Verify links in emails and ensure that they match the domain name of the sender. If domain names don’t match or there are inconsistent email addresses and links, avoid clicking and report to IT departments or MSPs.
4. Sense of Urgency
Watch out for messages with a sense of urgency or threats as hackers may use these tactics to fluster users into taking action on fraudulent messages.
5. Questionable Attachments
Don’t open suspicious attachments in emails from unfamiliar sources or those that you didn’t request or expect to receive. It’s always best to verify with the supposed sender before opening attachments.
6. Generic Greetings
Beware of generic and impersonal greetings such as ‘Dear Customer’ or ‘Valued Employee’ as these are often used by hackers to save time and maximize their number of potential victims. Verify sender email, domain, and other information before taking any actions.
7. Unusual Prizes & Discounts
Don’t fall for messages that offer discounts or prizes by clicking on a link or opening an attachment, as these are often used by hackers to tempt users to open fraudulent emails. Report to IT team.
8. Requesting for Sensitive Information
Be cautious of requests for credentials, payment information, or other personal details, especially when an official-looking email directs you to a fake landing page with a login box or payment request. Verify with the sender before entering any sensitive or financial information.